Help Net Security
The risks when networks collide
The increasing convergence of multiple networks for voice, data, video and other services onto a single infrastructure based on IP, has the potential to leave serious gaps in …
Three indicted in $100 million scareware fraud scheme
An international cybercrime scheme caused Internet users in more than 60 countries to purchase more than one million bogus software products, causing victims to lose more than …
Bizploit ERP penetration testing framework
Bizploit is the first open source ERP penetration testing framework. Developed by the Onapsis Research Labs, Bizploit assists security professionals in the discovery, …
FreeBSD 8.1-BETA1 released
The first of the test builds for the FreeBSD 8.1 release cycle is now available for several architectures. If you are updating an already running machine the CVS branch tag is …
New version of nCircle’s certified PCI scan service
nCircle announced a new version of its Certified PCI Scan Service, which adds significant functionality designed to simplify the compliance workflow for merchants of all …
Critical vulnerabilities in Photoshop CS4
Critical vulnerabilities have been identified in Photoshop CS4 11.01 and earlier for Windows and Macintosh that could allow an attacker who successfully exploits these …
All-inclusive security solution from Radware
Radware announced APSolute Attack Prevention, a security solution that connects several defenses together, allowing them to work synchronously and provide protection from …
Number of threats from the UK rising
The number of Internet threats coming from the UK has increased in May, according to Network Box. The UK is now responsible for nearly six (5.9) per cent of the world’s …
Rogue software details: Win Antispyware Center
Win Antispyware Center is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files …
OpenNetAdmin: Database managed inventory of your IP network
OpenNetAdmin is a system for tracking basic IP network attributes in a database. A web interface is provided to administer the data as well several backend processes for …
Week in review: Facebook, phishing and social engineering
Here’s an overview of some of last week’s most interesting news, articles, reviews, interviews and videos: Google now supports encrypted search Google just rolled …
Video: Facebook privacy changes
There has been lot of talk on the latest Facebook privacy changes. Robert Scoble published a 10 minute video from the Facebook press event where Mark Zuckerberg discussed the …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware